-
1 modem compression
A technique used to reduce the number of characters transmitted without losing data content. The transmitting modem compresses the data and the receiving computer or modem decompresses the data back to its original state. -
2 ar-sa مسؤول المجال
A technique for detecting when data is lost during transmission. This allows the software to recover lost data by notifying the transmitting computer that it needs to retransmit the data. -
3 error detection
A technique for detecting when data is lost during transmission. This allows the software to recover lost data by notifying the transmitting computer that it needs to retransmit the data. -
4 phishing
A technique used to trick computer users into revealing personal or financial information. A common online phishing scam starts with an e-mail message that appears to come from a trusted source but actually directs recipients to provide information to a fraudulent Web site. -
5 Perlin Noise
"A technique developed by Ken Perlin which uses a texturing primitive (noise) in combination with mathematical expressions to render natural looking images and textures such as ice, wood grain and stone on computer generated surfaces in graphics and animations." -
6 Multiple Render Targets
"In computer graphics, a technique which submits different colours to multiple output colour buffers in a single pass writing up to four different colour values to four separate buffers." -
7 MRTs
"In computer graphics, a technique which submits different colours to multiple output colour buffers in a single pass writing up to four different colour values to four separate buffers."
См. также в других словарях:
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Computer facial animation — is primarily an area of computer graphics that encapsulates models and techniques for generating and animating images of the human head and face. Due to its subject and output type, it is also related to many other scientific and artistic fields… … Wikipedia
Computer-generated holography — (CGH) is the method of digitally generating holographic interference patterns. A holographic image can be generated e.g. by digitally computing a holographic interference pattern and printing it onto a mask or film for subsequent illumination by… … Wikipedia
Computer network — Computer networks redirects here. For the periodical, see Computer Networks (journal). Datacom redirects here. For other uses, see Datacom (disambiguation). Internet map. The Internet is a global system of interconnected computer networks that… … Wikipedia
Computer vision — is the field concerned with automated imaging and automated computer based processing of images to extract and interpret information. It is the science and technology of machines that see. Here see means the machine is able to extract information … Wikipedia
Computer music — is a term that was originally used within academia to describe a field of study relating to the applications of computing technology in music composition; particularly that stemming from the Western art music tradition. It includes the theory and … Wikipedia
TECHNIQUE — À l’idée grecque de l’homme, zoon logon echon – vivant possédant le logos , le parler penser – les modernes ont juxtaposé, et même opposé, l’idée de l’Homo faber , l’homme défini par la fabrication d’instruments, donc la possession d’outils. Les… … Encyclopédie Universelle
Computer-assisted language learning — (CALL) is succinctly defined in a seminal work by Levy (1997: p. 1) as the search for and study of applications of the computer in language teaching and learning .[1] CALL embraces a wide range of ICT applications and approaches to teaching… … Wikipedia
Computer ethics — is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia… … Wikipedia
Computer generated holography — (CGH) is the method of digitally generating holographic interference patterns. A holographic image can be generated e.g. by digitally computing a holographic interference pattern and printing it onto a mask or film for subsequent illumination by… … Wikipedia
Computer assisted composition — (or computer assisted composition) is the technique or practice of using a computer to aid in the composition of music, though the music itself may be performed either electronically or on traditional, non electronic instruments without the use… … Wikipedia